WhatIs definition: Incident response plan

Information Security Incident Response-Detection and Analysis

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Recovering stolen laptops one step at a time

    When a student's laptop was stolen last year on a university campus, police and IT investigators went to work, recovering it within a matter of weeks. Neil Spellman, one of the investigators on the case, offers some best practices on what to do if a ... 

  • Worst practices: Bad security incidents to avoid

    Some of information security's worst practices are just best practices ignored. And those guilty of today's big infosec mistakes range from chief security officers to network firewall managers to security staffs at giant financial firms and governmen... 

  • Incident response success in five quick steps

    Most organizations claim to have an incident response plan, but if it exists only in someone's head or as a few sketches on a crusty notepad, then that's as good as asking for failure. In this tip, security management expert Mike Rothman outlines fiv... 

  • The forensics mindset: Making life easier for investigators

    Eventually every enterprise suffers an incident, and a little preparation now can make all the difference when an event occurs. In this tip, contributor Mike Rothman explains why thinking like an investigator can help security pros develop a successf... 

  • Digital forensics tool Helix 'does no harm'

    Forensics isn't just for the scientists. This month, contributor Scott Sidel recommends Helix, a digital forensics tool that can do some important detective work on your system. 

  • The cost of data breaches: Looking at the hard numbers

    Trying to determine the cost of a data breach is no easy task. After calculating the expenses of legal fees, call centers, lost employee productivity, regulatory fines, stock plummets and customer losses, it can be dizzying, if not impossible, to com... 

  • Reasons why enterprise networking and security roles must stay separate

    Enterprise network managers are responsible for configuring and managing network devices, but should they be accountable for tasks that are typically handled by the information security team? Contributor Shon Harris examines why networking and inform... 

  • Disaster recovery report card: Measuring your company's disaster recovery profile

    Disaster recovery planning is challenging because you don't know what you're planning for or how well your disaster recovery plan will hold up in the face of an emergency. Use this report card to measure your disaster recovery plan and identify areas... 

  • What to do when you've been hacked

    Network hacking attacks are more common that most of us would like to admit. In the second installment of his series on managing secure networks, Michael Gregg looks at six questions you need to ask of your organization if you've been hacked, and sug... 

  • How to build a secure network from the ground up

    Receive peer advice on what steps are crucial when building a secure network from the ground up. Also learn what resources are available to guide you through this process.